-
2
-
-
0002885224
-
Prudent Engineering Practice for Cryptographic Protocols
-
Abadi, M. and Needham, R.: Prudent Engineering Practice for Cryptographic Protocols. IEEE Transactions on Software Engineering, 22(1) (January 1996)
-
(1996)
IEEE Transactions on Software Engineering
, vol.22 January
, Issue.1
-
-
Abadi, M.1
Needham, R.2
-
5
-
-
1542593353
-
Authentication and Authenticated Key Exchanges
-
Diffie, W., van Oorschot, P.C., and Wiener, M.J.: Authentication and Authenticated Key Exchanges. Design, Codes and Cryptography, 2:107-125 (1992)
-
(1992)
Design, Codes and Cryptography
, vol.2
, pp. 107-125
-
-
Diffie, W.1
van Oorschot, P.C.2
Wiener, M.J.3
-
8
-
-
84955571226
-
Analysis of cryptographic protocols: The environment and the application
-
August
-
Durante, A.: Analysis of cryptographic protocols: the environment and the application. In: Proceedings of 15th IFIP SEC 2000. (August 2000)
-
(2000)
Proceedings of 15Th IFIP SEC 2000
-
-
Durante, A.1
-
9
-
-
0032659620
-
CVS: A tools for the analysis of cryp- tographic protocols
-
Durante, A., Focardi, R., and Gorrieri, R.: CVS: a tools for the analysis of cryp- tographic protocols. In Proceedings of 12th IEEE Computer Security Foundation Workshop, (July 1999) 203-212
-
(1999)
Proceedings of 12Th IEEE Computer Security Foundation Workshop
, pp. 203-212
-
-
Durante, A.1
Focardi, R.2
Gorrieri, R.3
-
12
-
-
84974776068
-
A Classification of Security Properties for Process Algebras
-
Focardi, R. and Gorrieri, R.: A Classification of Security Properties for Process Algebras. Journal of Computer Security, 3(1):5-33 (1995)
-
(1995)
Journal of Computer Security
, vol.3
, Issue.1
, pp. 5-33
-
-
Focardi, R.1
Gorrieri, R.2
-
13
-
-
0001439194
-
The Compositional Security Checker: A Tool for the Verification of Information Flow Security Properties
-
September
-
Focardi, R. and Gorrieri, R.: The Compositional Security Checker: A Tool for the Verification of Information Flow Security Properties. IEEE Transactions on Software Engineering, 23(9):550-571 (September 1997)
-
(1997)
IEEE Transactions on Software Engineering
, vol.23
, Issue.9
, pp. 550-571
-
-
Focardi, R.1
Gorrieri, R.2
-
14
-
-
0003207615
-
Non Interference for the Analysis of Cryptographic Protocols
-
LNCS 1853 (July
-
Focardi, R., Gorrieri, R., and Martinelli, F.: “Non Interference for the Analysis of Cryptographic Protocols". In Proceedings of ICALP' 00. LNCS 1853 (July 2000) 744-755
-
(2000)
Proceedings of ICALP' 00
, pp. 744-755
-
-
Focardi, R.1
Gorrieri, R.2
Martinelli, F.3
-
17
-
-
19144370194
-
On the Verification of Cryptographic Protocols - A Tale of Two Committees
-
of ENTCS
-
Gollman, D.: On the Verification of Cryptographic Protocols - A Tale of Two Committees. In: Workshop on secure architectures and information flow. Vol. 32 of ENTCS (2000)
-
(2000)
Workshop on Secure Architectures and Information Flow
, vol.32
-
-
Gollman, D.1
-
20
-
-
0030678388
-
CASPER: A Compiler for the Analysis of the security protocols
-
Rockport Massachusetts (USA). IEEE Press 18-30 (June
-
Lowe, G.: CASPER: A Compiler for the Analysis of the security protocols. In: Proceedings Tenth IEEE Computer Security Foundation Workshop, (CSFW'97). Rockport Massachusetts (USA). IEEE Press 18-30 (June 1997)
-
(1997)
Proceedings Tenth IEEE Computer Security Foundation Workshop, (CSFW'97)
-
-
Lowe, G.1
-
21
-
-
0030084918
-
The NRL Protocol Analyzer: An Overview
-
Meadows, C.: The NRL Protocol Analyzer: An Overview. Journal of Logic Pro- gramming, 26(2):113-131 (1996)
-
(1996)
Journal of Logic Pro- Gramming
, vol.26
, Issue.2
, pp. 113-131
-
-
Meadows, C.1
-
24
-
-
84955574180
-
Paulson: The Inductive Approach to Verifying Cryptographic Pro- tocols
-
Rockport Massachusetts (USA), IEEE Press. (June
-
Lawrence C. Paulson: The Inductive Approach to Verifying Cryptographic Pro- tocols. In: Proceedings Tenth IEEE Computer Security Foundation Workshop, (CSFW'97), Rockport Massachusetts (USA), IEEE Press. (June 1997)
-
(1997)
Proceedings Tenth IEEE Computer Security Foundation Workshop, (CSFW'97)
-
-
Lawrence, C.1
-
25
-
-
0003855464
-
-
John Wiley & Sons, Inc, second edition
-
Schneier, B.: Applied Cryptography. John Wiley & Sons, Inc. (1996) second edition
-
(1996)
Applied Cryptography
-
-
Schneier, B.1
-
26
-
-
84955591178
-
-
May
-
SET Secure Electronic Transaction LLC. The SET Standard Specification. Available at the URL, http://www.setco.org/set specifications.html (May 1997)
-
(1997)
The SET Standard Specification
-
-
-
27
-
-
0026630927
-
Authentication for distributed systems
-
March
-
Woo T.Y.C. and Lam, S.S.: Authentication for distributed systems. Computer, 25:10-10 (March 1992)
-
(1992)
Computer
, vol.25
, pp. 10-15
-
-
Woo, T.1
Lam, S.S.2
|